<--- Back to Details
First PageDocument Content
Advanced Encryption Standard / Cipher / GOST / Feistel cipher / Linear cryptanalysis / ICE / Weak key / Symmetric-key algorithm / Serpent / Cryptography / Block ciphers / Key schedule
Date: 2011-12-13 18:32:02
Advanced Encryption Standard
Cipher
GOST
Feistel cipher
Linear cryptanalysis
ICE
Weak key
Symmetric-key algorithm
Serpent
Cryptography
Block ciphers
Key schedule

LNCS[removed]SEA: A Scalable Encryption Algorithm for Small Embedded Applications

Add to Reading List

Source URL: cba.mit.edu

Download Document from Source Website

File Size: 547,17 KB

Share Document on Facebook

Similar Documents

Cryptography / Format-preserving encryption / Feistel cipher / Ciphertext indistinguishability / Advantage

Format-Preserving Encryption Mihir Bellare1 , Thomas Ristenpart1 , Phillip Rogaway2 , and Till Stegers2 1 Dept. of Computer Science & Engineering, UC San Diego, La Jolla, CA 92093, USA 2

DocID: 1qY1X - View Document

Cryptography / Radio-frequency identification / Data Encryption Standard / Automatic identification and data capture / Wireless / Feistel cipher / Singulation / Advanced Encryption Standard / Stream cipher / Digital signature / Digital signature transponder

Proceedings - NN - RFIDSec08

DocID: 1qGBX - View Document

Cryptography / Authenticated encryption / Block cipher mode of operation / Semantic security / RSA / Ciphertext / Integrated Encryption Scheme / Feistel cipher

D:/Documents/Courses/Winter 2014/aez/rae.dvi

DocID: 1qyAn - View Document

Cryptography / Feistel cipher / Block cipher / Format-preserving encryption / Data Encryption Standard / ICE / Skipjack

On Generalized Feistel Networks Viet Tung Hoang and Phillip Rogaway Dept. of Computer Science, University of California, Davis, USA Abstract. We prove beyond-birthday-bound security for most of the well-known types of ge

DocID: 1q88i - View Document

Cryptography / Block cipher / Probabilistic encryption / Semantic security / RSA / Advantage / Feistel cipher / Malleability / Chosen-plaintext attack / Ciphertext / Cryptosystem / Data Encryption Standard

A Formal Treatment of Remotely Keyed Encryption? Matt Blaze1 Joan Feigenbaum1 Moni Naor2 AT&T Labs { Research 180 Park Avenue Florham Park, NJUSA

DocID: 1pT7s - View Document